Critical infrastructure protection in homeland security: defending a networked nation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley-Interscience
©2006
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 URL des Erstveröffentlichers |
Beschreibung: | "Published simultaneously in Canada"--Title page verso Includes bibliographical references and index While the emphasis is on the development of policies that lead to prevention of terrorist attacks on the nation's infrastructure, this textbook is a scientific study of infrastructures and their protection. It applies network theory, optimization theory and simulation software, to analyze and understand how various infrastructure sectors evolve |
Beschreibung: | 1 Online-Ressource (xii, 474 pages) |
ISBN: | 0471789534 9780471789536 0471786284 9780471786283 0471789542 9780471789543 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043385298 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2006 |||| o||u| ||||||eng d | ||
020 | |a 0471789534 |c electronic bk. |9 0-471-78953-4 | ||
020 | |a 9780471789536 |c electronic bk. |9 978-0-471-78953-6 | ||
020 | |a 0471786284 |9 0-471-78628-4 | ||
020 | |a 9780471786283 |9 978-0-471-78628-3 | ||
020 | |a 0471789542 |c electronic bk. |9 0-471-78954-2 | ||
020 | |a 9780471789543 |c electronic bk. |9 978-0-471-78954-3 | ||
024 | 7 | |a 10.1002/0471789542 |2 doi | |
035 | |a (ZDB-35-WIC)ocm68481071 | ||
035 | |a (OCoLC)68481071 | ||
035 | |a (DE-599)BVBBV043385298 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 | ||
082 | 0 | |a 005.8/0973 |2 22 | |
100 | 1 | |a Lewis, T. G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Critical infrastructure protection in homeland security |b defending a networked nation |c Ted G. Lewis |
264 | 1 | |a Hoboken, N.J. |b Wiley-Interscience |c ©2006 | |
300 | |a 1 Online-Ressource (xii, 474 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "Published simultaneously in Canada"--Title page verso | ||
500 | |a Includes bibliographical references and index | ||
500 | |a While the emphasis is on the development of policies that lead to prevention of terrorist attacks on the nation's infrastructure, this textbook is a scientific study of infrastructures and their protection. It applies network theory, optimization theory and simulation software, to analyze and understand how various infrastructure sectors evolve | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Politik | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Computer networks / Security measures / United States | |
650 | 4 | |a Computer security / United States / Planning | |
650 | 4 | |a Terrorism / United States / Prevention | |
650 | 4 | |a Terrorism / Government policy / United States | |
650 | 4 | |a Civil defense / United States | |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internationaler Terrorismus |0 (DE-588)4162078-1 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
653 | |a Electronic books | ||
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | 3 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 0 | 4 | |a Internationaler Terrorismus |0 (DE-588)4162078-1 |D s |
689 | 0 | 5 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/0471789542 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028803882 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/0471789542 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/0471789542 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175953468850176 |
---|---|
any_adam_object | |
author | Lewis, T. G. |
author_facet | Lewis, T. G. |
author_role | aut |
author_sort | Lewis, T. G. |
author_variant | t g l tg tgl |
building | Verbundindex |
bvnumber | BV043385298 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocm68481071 (OCoLC)68481071 (DE-599)BVBBV043385298 |
dewey-full | 005.8/0973 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/0973 |
dewey-search | 005.8/0973 |
dewey-sort | 15.8 3973 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03544nmm a2200757zc 4500</leader><controlfield tag="001">BV043385298</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471789534</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-471-78953-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471789536</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-471-78953-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471786284</subfield><subfield code="9">0-471-78628-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471786283</subfield><subfield code="9">978-0-471-78628-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471789542</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-471-78954-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471789543</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-471-78954-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/0471789542</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocm68481071</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)68481071</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043385298</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/0973</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lewis, T. G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical infrastructure protection in homeland security</subfield><subfield code="b">defending a networked nation</subfield><subfield code="c">Ted G. Lewis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley-Interscience</subfield><subfield code="c">©2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 474 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Published simultaneously in Canada"--Title page verso</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">While the emphasis is on the development of policies that lead to prevention of terrorist attacks on the nation's infrastructure, this textbook is a scientific study of infrastructures and their protection. It applies network theory, optimization theory and simulation software, to analyze and understand how various infrastructure sectors evolve</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / United States / Planning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism / United States / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism / Government policy / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Civil defense / United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationaler Terrorismus</subfield><subfield code="0">(DE-588)4162078-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Internationaler Terrorismus</subfield><subfield code="0">(DE-588)4162078-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/0471789542</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028803882</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/0471789542</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/0471789542</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043385298 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:29Z |
institution | BVB |
isbn | 0471789534 9780471789536 0471786284 9780471786283 0471789542 9780471789543 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028803882 |
oclc_num | 68481071 |
open_access_boolean | |
owner | DE-861 |
owner_facet | DE-861 |
physical | 1 Online-Ressource (xii, 474 pages) |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Wiley-Interscience |
record_format | marc |
spelling | Lewis, T. G. Verfasser aut Critical infrastructure protection in homeland security defending a networked nation Ted G. Lewis Hoboken, N.J. Wiley-Interscience ©2006 1 Online-Ressource (xii, 474 pages) txt rdacontent c rdamedia cr rdacarrier "Published simultaneously in Canada"--Title page verso Includes bibliographical references and index While the emphasis is on the development of policies that lead to prevention of terrorist attacks on the nation's infrastructure, this textbook is a scientific study of infrastructures and their protection. It applies network theory, optimization theory and simulation software, to analyze and understand how various infrastructure sectors evolve COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Politik Terrorismus Computer networks / Security measures / United States Computer security / United States / Planning Terrorism / United States / Prevention Terrorism / Government policy / United States Civil defense / United States Bekämpfung (DE-588)4112701-8 gnd rswk-swf Innere Sicherheit (DE-588)4127888-4 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Internationaler Terrorismus (DE-588)4162078-1 gnd rswk-swf USA Electronic books Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Eindringerkennung (DE-588)4706627-1 s Innere Sicherheit (DE-588)4127888-4 s Internationaler Terrorismus (DE-588)4162078-1 s Bekämpfung (DE-588)4112701-8 s 1\p DE-604 https://onlinelibrary.wiley.com/doi/book/10.1002/0471789542 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Lewis, T. G. Critical infrastructure protection in homeland security defending a networked nation COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Politik Terrorismus Computer networks / Security measures / United States Computer security / United States / Planning Terrorism / United States / Prevention Terrorism / Government policy / United States Civil defense / United States Bekämpfung (DE-588)4112701-8 gnd Innere Sicherheit (DE-588)4127888-4 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Eindringerkennung (DE-588)4706627-1 gnd Internationaler Terrorismus (DE-588)4162078-1 gnd |
subject_GND | (DE-588)4112701-8 (DE-588)4127888-4 (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4706627-1 (DE-588)4162078-1 |
title | Critical infrastructure protection in homeland security defending a networked nation |
title_auth | Critical infrastructure protection in homeland security defending a networked nation |
title_exact_search | Critical infrastructure protection in homeland security defending a networked nation |
title_full | Critical infrastructure protection in homeland security defending a networked nation Ted G. Lewis |
title_fullStr | Critical infrastructure protection in homeland security defending a networked nation Ted G. Lewis |
title_full_unstemmed | Critical infrastructure protection in homeland security defending a networked nation Ted G. Lewis |
title_short | Critical infrastructure protection in homeland security |
title_sort | critical infrastructure protection in homeland security defending a networked nation |
title_sub | defending a networked nation |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Politik Terrorismus Computer networks / Security measures / United States Computer security / United States / Planning Terrorism / United States / Prevention Terrorism / Government policy / United States Civil defense / United States Bekämpfung (DE-588)4112701-8 gnd Innere Sicherheit (DE-588)4127888-4 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Eindringerkennung (DE-588)4706627-1 gnd Internationaler Terrorismus (DE-588)4162078-1 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Politik Terrorismus Computer networks / Security measures / United States Computer security / United States / Planning Terrorism / United States / Prevention Terrorism / Government policy / United States Civil defense / United States Bekämpfung Innere Sicherheit Rechnernetz Computersicherheit Eindringerkennung Internationaler Terrorismus USA |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/0471789542 |
work_keys_str_mv | AT lewistg criticalinfrastructureprotectioninhomelandsecuritydefendinganetworkednation |